Lines Matching refs:mService

78     private final IDevicePolicyManager mService;
82 mService = IDevicePolicyManager.Stub.asInterface(
89 return me.mService != null ? me : null;
472 if (mService != null) {
474 return mService.isAdminActive(who, userId);
496 if (mService != null) {
498 return mService.getActiveAdmins(userId);
512 if (mService != null) {
514 return mService.packageHasActiveAdmins(packageName, UserHandle.myUserId());
529 if (mService != null) {
531 mService.removeActiveAdmin(who, UserHandle.myUserId());
548 if (mService != null) {
550 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId());
649 if (mService != null) {
651 mService.setPasswordQuality(admin, quality, UserHandle.myUserId());
670 if (mService != null) {
672 return mService.getPasswordQuality(admin, userHandle);
702 if (mService != null) {
704 mService.setPasswordMinimumLength(admin, length, UserHandle.myUserId());
723 if (mService != null) {
725 return mService.getPasswordMinimumLength(admin, userHandle);
756 if (mService != null) {
758 mService.setPasswordMinimumUpperCase(admin, length, UserHandle.myUserId());
784 if (mService != null) {
786 return mService.getPasswordMinimumUpperCase(admin, userHandle);
817 if (mService != null) {
819 mService.setPasswordMinimumLowerCase(admin, length, UserHandle.myUserId());
845 if (mService != null) {
847 return mService.getPasswordMinimumLowerCase(admin, userHandle);
877 if (mService != null) {
879 mService.setPasswordMinimumLetters(admin, length, UserHandle.myUserId());
903 if (mService != null) {
905 return mService.getPasswordMinimumLetters(admin, userHandle);
935 if (mService != null) {
937 mService.setPasswordMinimumNumeric(admin, length, UserHandle.myUserId());
962 if (mService != null) {
964 return mService.getPasswordMinimumNumeric(admin, userHandle);
994 if (mService != null) {
996 mService.setPasswordMinimumSymbols(admin, length, UserHandle.myUserId());
1020 if (mService != null) {
1022 return mService.getPasswordMinimumSymbols(admin, userHandle);
1052 if (mService != null) {
1054 mService.setPasswordMinimumNonLetter(admin, length, UserHandle.myUserId());
1079 if (mService != null) {
1081 return mService.getPasswordMinimumNonLetter(admin, userHandle);
1112 if (mService != null) {
1114 mService.setPasswordHistoryLength(admin, length, UserHandle.myUserId());
1144 if (mService != null) {
1146 mService.setPasswordExpirationTimeout(admin, timeout, UserHandle.myUserId());
1163 if (mService != null) {
1165 return mService.getPasswordExpirationTimeout(admin, UserHandle.myUserId());
1184 if (mService != null) {
1186 return mService.getPasswordExpiration(admin, UserHandle.myUserId());
1207 if (mService != null) {
1209 return mService.getPasswordHistoryLength(admin, userHandle);
1240 if (mService != null) {
1242 return mService.isActivePasswordSufficient(UserHandle.myUserId());
1259 if (mService != null) {
1261 return mService.getCurrentFailedPasswordAttempts(UserHandle.myUserId());
1289 if (mService != null) {
1291 mService.setMaximumFailedPasswordsForWipe(admin, num, UserHandle.myUserId());
1311 if (mService != null) {
1313 return mService.getMaximumFailedPasswordsForWipe(admin, userHandle);
1352 if (mService != null) {
1354 return mService.resetPassword(password, flags, UserHandle.myUserId());
1376 if (mService != null) {
1378 mService.setMaximumTimeToLock(admin, timeMs, UserHandle.myUserId());
1399 if (mService != null) {
1401 return mService.getMaximumTimeToLock(admin, userHandle);
1418 if (mService != null) {
1420 mService.lockNow();
1447 if (mService != null) {
1449 mService.wipeData(flags, UserHandle.myUserId());
1484 if (mService != null) {
1520 return mService.setGlobalProxy(admin, hostSpec, exclSpec, UserHandle.myUserId());
1545 if (mService != null) {
1547 mService.setRecommendedGlobalProxy(admin, proxyInfo);
1561 if (mService != null) {
1563 return mService.getGlobalProxyAdmin(UserHandle.myUserId());
1684 if (mService != null) {
1686 return mService.setStorageEncryption(admin, encrypt, UserHandle.myUserId());
1704 if (mService != null) {
1706 return mService.getStorageEncryption(admin, UserHandle.myUserId());
1736 if (mService != null) {
1738 return mService.getStorageEncryptionStatus(userHandle);
1756 if (mService != null) {
1758 return mService.installCaCert(admin, certBuffer);
1773 if (mService != null) {
1776 mService.uninstallCaCert(admin, alias);
1795 if (mService != null) {
1797 mService.enforceCanManageCaCerts(admin);
1820 if (mService != null) {
1823 mService.uninstallCaCert(admin, alias);
1838 if (mService != null) {
1840 mService.enforceCanManageCaCerts(admin);
1866 return mService.installKeyPair(who, privKey.getEncoded(), pemCert, alias);
1901 if (mService != null) {
1903 mService.setCameraDisabled(admin, disabled, UserHandle.myUserId());
1922 if (mService != null) {
1924 return mService.getCameraDisabled(admin, userHandle);
1945 if (mService != null) {
1947 mService.setScreenCaptureDisabled(admin, UserHandle.myUserId(), disabled);
1966 if (mService != null) {
1968 return mService.getScreenCaptureDisabled(admin, userHandle);
1989 if (mService != null) {
1991 mService.setAutoTimeRequired(admin, UserHandle.myUserId(), required);
2002 if (mService != null) {
2004 return mService.getAutoTimeRequired();
2030 if (mService != null) {
2032 mService.setKeyguardDisabledFeatures(admin, which, UserHandle.myUserId());
2053 if (mService != null) {
2055 return mService.getKeyguardDisabledFeatures(admin, userHandle);
2067 if (mService != null) {
2069 mService.setActiveAdmin(policyReceiver, refreshing, userHandle);
2115 if (mService != null) {
2117 mService.getRemoveWarning(admin, result, UserHandle.myUserId());
2129 if (mService != null) {
2131 mService.setActivePasswordState(quality, length, letters, uppercase, lowercase,
2143 if (mService != null) {
2145 mService.reportFailedPasswordAttempt(userHandle);
2156 if (mService != null) {
2158 mService.reportSuccessfulPasswordAttempt(userHandle);
2195 if (mService != null) {
2197 return mService.setDeviceOwner(packageName, ownerName);
2219 if (mService != null) {
2221 return mService.isDeviceOwner(packageName);
2247 if (mService != null) {
2249 mService.clearDeviceOwner(packageName);
2259 if (mService != null) {
2261 return mService.getDeviceOwner();
2271 if (mService != null) {
2273 return mService.getDeviceOwnerName();
2300 if (mService != null) {
2303 mService.setActiveAdmin(admin, false, myUserId);
2304 return mService.setProfileOwner(admin, ownerName, myUserId);
2324 if (mService != null) {
2326 mService.clearProfileOwner(admin);
2338 if (mService != null) {
2340 return mService.hasUserSetupCompleted();
2386 if (mService != null) {
2391 return mService.setProfileOwner(admin, ownerName, userHandle);
2409 if (mService != null) {
2411 mService.setProfileEnabled(admin);
2429 if (mService != null) {
2431 mService.setProfileName(who, profileName);
2447 if (mService != null) {
2449 ComponentName profileOwner = mService.getProfileOwner(
2476 if (mService != null) {
2478 return mService.getProfileOwner(userId);
2495 if (mService != null) {
2497 return mService.getProfileOwnerName(Process.myUserHandle().getIdentifier());
2516 if (mService != null) {
2518 return mService.getProfileOwnerName(userId);
2547 if (mService != null) {
2549 mService.addPersistentPreferredActivity(admin, filter, activity);
2568 if (mService != null) {
2570 mService.clearPackagePersistentPreferredActivities(admin, packageName);
2597 if (mService != null) {
2599 mService.setApplicationRestrictions(admin, packageName, settings);
2623 if (mService != null) {
2625 mService.setTrustAgentFeaturesEnabled(admin, agent, features, UserHandle.myUserId());
2643 if (mService != null) {
2645 return mService.getTrustAgentFeaturesEnabled(admin, agent, UserHandle.myUserId());
2664 if (mService != null) {
2666 mService.setCrossProfileCallerIdDisabled(who, disabled);
2683 if (mService != null) {
2685 return mService.getCrossProfileCallerIdDisabled(who);
2700 if (mService != null) {
2702 return mService.getCrossProfileCallerIdDisabledForUser(userHandle.getIdentifier());
2720 if (mService != null) {
2722 mService.addCrossProfileIntentFilter(admin, filter, flags);
2736 if (mService != null) {
2738 mService.clearCrossProfileIntentFilters(admin);
2768 if (mService != null) {
2770 return mService.setPermittedAccessibilityServices(admin, packageNames);
2788 if (mService != null) {
2790 return mService.getPermittedAccessibilityServices(admin);
2812 if (mService != null) {
2814 return mService.getPermittedAccessibilityServicesForUser(userId);
2846 if (mService != null) {
2848 return mService.setPermittedInputMethods(admin, packageNames);
2867 if (mService != null) {
2869 return mService.getPermittedInputMethods(admin);
2890 if (mService != null) {
2892 return mService.getPermittedInputMethodsForCurrentUser();
2913 return mService.createUser(admin, name);
2947 return mService.createAndInitializeUser(admin, name, ownerName, profileOwnerComponent,
2965 return mService.removeUser(admin, userHandle);
2983 return mService.switchUser(admin, userHandle);
3004 if (mService != null) {
3006 return mService.getApplicationRestrictions(admin, packageName);
3027 if (mService != null) {
3029 mService.setUserRestriction(admin, key, true);
3049 if (mService != null) {
3051 mService.setUserRestriction(admin, key, false);
3070 if (mService != null) {
3072 return mService.setApplicationHidden(admin, packageName, hidden);
3088 if (mService != null) {
3090 return mService.isApplicationHidden(admin, packageName);
3106 if (mService != null) {
3108 mService.enableSystemApp(admin, packageName);
3125 if (mService != null) {
3127 return mService.enableSystemAppWithIntent(admin, intent);
3151 if (mService != null) {
3153 mService.setAccountManagementDisabled(admin, accountType, disabled);
3179 if (mService != null) {
3181 return mService.getAccountTypesWithManagementDisabledAsUser(userId);
3206 if (mService != null) {
3208 mService.setLockTaskPackages(admin, packages);
3222 if (mService != null) {
3224 return mService.getLockTaskPackages(admin);
3238 if (mService != null) {
3240 return mService.isLockTaskPermitted(pkg);
3271 if (mService != null) {
3273 mService.setGlobalSetting(admin, setting, value);
3298 if (mService != null) {
3300 mService.setSecureSetting(admin, setting, value);
3318 if (mService != null) {
3320 mService.setRestrictionsProvider(admin, provider);
3334 if (mService != null) {
3336 mService.setMasterVolumeMuted(admin, on);
3350 if (mService != null) {
3352 return mService.isMasterVolumeMuted(admin);
3370 if (mService != null) {
3372 mService.setUninstallBlocked(admin, packageName, uninstallBlocked);
3388 if (mService != null) {
3390 return mService.isUninstallBlocked(admin, packageName);
3417 if (mService != null) {
3419 return mService.addCrossProfileWidgetProvider(admin, packageName);
3445 if (mService != null) {
3447 return mService.removeCrossProfileWidgetProvider(admin, packageName);
3466 if (mService != null) {
3468 List<String> providers = mService.getCrossProfileWidgetProviders(admin);